SlideShare uma empresa Scribd logo
1 de 8
Information Communication Technology
An Introduction to Legislation in the UK




                             Stonemasonry Department 2012
Legislation
Now that you understand what ICT can be used for, and how
you interact with it through hardware devices and software
 applications it is important to know about the legislation
    which covers the use of ICT in the United Kingdom.

         In this presentation you will learn about:

              The Computer Misuse Act 1990
                 The Data Protection Act
                      Copyright Law
Computer Misuse Act 1990
 This act makes it illegal to do any of the following:

 Access computer material without permission, eg looking
 at someone else's files.

 Access computer material without permission with intent
 to commit further criminal offences, eg hacking into the
 bank's computer and wanting to increase the amount in
 your account.

 Alter computer data without permission, eg writing a virus
 to destroy someone else's data, or actually changing the
 money in an account.
Information taken directly from http://www.bbc.co.uk/schools/gcsebitesize/ict/legal/1dataandcomputermisuserev2.shtml
Is Hacking Illegal?
The short answer to this question is NO! Hacking is not illegal
provided you are doing it for legitimate purposes. Computer
hackers are split into three distinct groups; black hat, grey hat
                         and white hat.




     ILLEGAL                ILLEGAL               LEGAL
                            (but not criminal)
Is Hacking Illegal?
 Black hat hackers target the websites/data of
 organisations or people without permission and with the
 intent of causing harm, stealing files or profiting as a
 direct result of gaining access to a system.

 Grey hat hackers also gain access to systems without the
 permission of the owner but once in, they either inform
 the owner of how to improve security or fix any flaws
 themselves.

 White hat hackers gain access to systems with the
 permission of the owner. They carry out penetration
 testing “pen tests” to make sure that systems are secure.
The Data Protection Act (1998)

 The DPA 1998 was passed by Parliament to control the
 way information is handled and to give legal rights to
 people who have information stored about them.

 Some data and information stored on a computer is
 personal and needs to be kept confidential. People want to
 keep their pay, bank details, and medical records private
 and away from the view of just anybody. If someone who is
 not entitled to see these details can obtain access without
 permission it is unauthorised access. The Data Protection
 Act sets up rules to prevent this happening.

Information taken directly from http://www.bbc.co.uk/schools/gcsebitesize/ict/legal/1dataandcomputermisuserev2.shtml
Copyright Law

 This provides protection to the owners of the copyright
 and covers the copying of written, musical, or film works
 using computers. FAST is the industry body which is against
 software theft.

 There have been cases where laws such as Copyright have
 been used to crack down on file sharing websites or
 individuals who store and illegally distribute copyrighted
 material, eg music. There is a massive problem with many
 people around the world obtaining copyrighted material
 illegally.

Information taken directly from http://www.bbc.co.uk/schools/gcsebitesize/ict/legal/1dataandcomputermisuserev2.shtml
Developed by The Stonemasonry Department
          City of Glasgow College
                    2012

Mais conteúdo relacionado

Mais procurados

introduction to cyber law and cyber crime
introduction to cyber law and cyber crimeintroduction to cyber law and cyber crime
introduction to cyber law and cyber crimeAbhinav Tyagi
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber SecurityStephen Lahanas
 
Information communication technology
Information communication technologyInformation communication technology
Information communication technologyBeing Aabis
 
Cyber threats
Cyber threatsCyber threats
Cyber threatskelsports
 
Phishing attack seminar presentation
Phishing attack seminar presentation Phishing attack seminar presentation
Phishing attack seminar presentation AniketPandit18
 
Privacy and Data Security
Privacy and Data SecurityPrivacy and Data Security
Privacy and Data SecurityWilmerHale
 
Ethics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodEthics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodcharvill
 
Data Security - English
Data Security - EnglishData Security - English
Data Security - EnglishData Security
 
Cybercrime And Cyber forensics
Cybercrime And  Cyber forensics Cybercrime And  Cyber forensics
Cybercrime And Cyber forensics sunanditaAnand
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityRamiro Cid
 
Cyber crime defination, meaning and history
Cyber crime defination, meaning and historyCyber crime defination, meaning and history
Cyber crime defination, meaning and historygururaj lulkarni
 
Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy IntroductionG Prachi
 
Unit 2 Regulation of Cyberspace
Unit 2 Regulation of CyberspaceUnit 2 Regulation of Cyberspace
Unit 2 Regulation of CyberspaceTushar Rajput
 

Mais procurados (20)

Computer crime
 Computer crime Computer crime
Computer crime
 
introduction to cyber law and cyber crime
introduction to cyber law and cyber crimeintroduction to cyber law and cyber crime
introduction to cyber law and cyber crime
 
Data Privacy & Security
Data Privacy & SecurityData Privacy & Security
Data Privacy & Security
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Information communication technology
Information communication technologyInformation communication technology
Information communication technology
 
Cyber threats
Cyber threatsCyber threats
Cyber threats
 
Communication security
Communication securityCommunication security
Communication security
 
Phishing attack seminar presentation
Phishing attack seminar presentation Phishing attack seminar presentation
Phishing attack seminar presentation
 
Ethics for IT Professionals
Ethics for IT ProfessionalsEthics for IT Professionals
Ethics for IT Professionals
 
Privacy and Data Security
Privacy and Data SecurityPrivacy and Data Security
Privacy and Data Security
 
Ethics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodEthics and privacy ppt 3rd period
Ethics and privacy ppt 3rd period
 
Data Security - English
Data Security - EnglishData Security - English
Data Security - English
 
Cybercrime And Cyber forensics
Cybercrime And  Cyber forensics Cybercrime And  Cyber forensics
Cybercrime And Cyber forensics
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber crime defination, meaning and history
Cyber crime defination, meaning and historyCyber crime defination, meaning and history
Cyber crime defination, meaning and history
 
Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy Introduction
 
Unit 2 Regulation of Cyberspace
Unit 2 Regulation of CyberspaceUnit 2 Regulation of Cyberspace
Unit 2 Regulation of Cyberspace
 
Online ethics
Online ethicsOnline ethics
Online ethics
 

Destaque

Presentation constructing an information panel
Presentation   constructing an information panelPresentation   constructing an information panel
Presentation constructing an information paneldoogstone
 
Snecked rubble step by step angled
Snecked rubble step by step angledSnecked rubble step by step angled
Snecked rubble step by step angleddoogstone
 
Presentation template making equipment
Presentation   template making equipmentPresentation   template making equipment
Presentation template making equipmentdoogstone
 
Student induction 2013-14
Student induction 2013-14Student induction 2013-14
Student induction 2013-14doogstone
 
Cutting a Return head
Cutting a Return headCutting a Return head
Cutting a Return headdoogstone
 
Checks and splays
Checks and splaysChecks and splays
Checks and splaysdoogstone
 
Presentation types of template
Presentation   types of templatePresentation   types of template
Presentation types of templatedoogstone
 
Template materials
Template materialsTemplate materials
Template materialsdoogstone
 
Hand arm vibration
Hand arm vibrationHand arm vibration
Hand arm vibrationdoogstone
 
Concrete Block Walling
Concrete Block WallingConcrete Block Walling
Concrete Block Wallingdoogstone
 
Sustainability
SustainabilitySustainability
SustainabilityDjCurrie
 
State of the omnichannel nation
State of the omnichannel nationState of the omnichannel nation
State of the omnichannel nationRasmus Houlind
 
Online assignment
Online assignmentOnline assignment
Online assignmentSano Anil
 
Lesson template of sabareesh.p.s
Lesson template of sabareesh.p.sLesson template of sabareesh.p.s
Lesson template of sabareesh.p.sSano Anil
 
Новости недвижимости Майами за август 2016
Новости недвижимости Майами за август 2016 Новости недвижимости Майами за август 2016
Новости недвижимости Майами за август 2016 The Reznik Group
 
Close to extinction/ Endangered Species in the Wild
Close to extinction/ Endangered Species in the WildClose to extinction/ Endangered Species in the Wild
Close to extinction/ Endangered Species in the WildZNHS West, DepEd
 
Hand doctor – kids game
Hand doctor – kids gameHand doctor – kids game
Hand doctor – kids gameArth I-Soft
 

Destaque (20)

Presentation constructing an information panel
Presentation   constructing an information panelPresentation   constructing an information panel
Presentation constructing an information panel
 
Snecked rubble step by step angled
Snecked rubble step by step angledSnecked rubble step by step angled
Snecked rubble step by step angled
 
Presentation template making equipment
Presentation   template making equipmentPresentation   template making equipment
Presentation template making equipment
 
Student induction 2013-14
Student induction 2013-14Student induction 2013-14
Student induction 2013-14
 
Chisels
ChiselsChisels
Chisels
 
Cutting a Return head
Cutting a Return headCutting a Return head
Cutting a Return head
 
Silica dust
Silica dustSilica dust
Silica dust
 
Checks and splays
Checks and splaysChecks and splays
Checks and splays
 
Presentation types of template
Presentation   types of templatePresentation   types of template
Presentation types of template
 
Template materials
Template materialsTemplate materials
Template materials
 
Hand arm vibration
Hand arm vibrationHand arm vibration
Hand arm vibration
 
Concrete Block Walling
Concrete Block WallingConcrete Block Walling
Concrete Block Walling
 
Sustainability
SustainabilitySustainability
Sustainability
 
State of the omnichannel nation
State of the omnichannel nationState of the omnichannel nation
State of the omnichannel nation
 
Online assignment
Online assignmentOnline assignment
Online assignment
 
Lesson template of sabareesh.p.s
Lesson template of sabareesh.p.sLesson template of sabareesh.p.s
Lesson template of sabareesh.p.s
 
Новости недвижимости Майами за август 2016
Новости недвижимости Майами за август 2016 Новости недвижимости Майами за август 2016
Новости недвижимости Майами за август 2016
 
Close to extinction/ Endangered Species in the Wild
Close to extinction/ Endangered Species in the WildClose to extinction/ Endangered Species in the Wild
Close to extinction/ Endangered Species in the Wild
 
Meditation 4
Meditation 4Meditation 4
Meditation 4
 
Hand doctor – kids game
Hand doctor – kids gameHand doctor – kids game
Hand doctor – kids game
 

Semelhante a It legislation

Business And The Law
Business And The LawBusiness And The Law
Business And The LawRobbieA
 
Computer misuse and criminal law
Computer misuse and criminal lawComputer misuse and criminal law
Computer misuse and criminal lawZaheer Irshad
 
Ethics and legislation in the it industry
Ethics and legislation in the it industryEthics and legislation in the it industry
Ethics and legislation in the it industryjamiehaworth1
 
Computer Miss-use and Criminal Law
Computer Miss-use and Criminal Law Computer Miss-use and Criminal Law
Computer Miss-use and Criminal Law sohaildanish
 
How to stay safe online
How to stay safe onlineHow to stay safe online
How to stay safe onlineHadilAlHaj
 
2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptx2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptxSSPTRGCELL
 
Cybercrime
CybercrimeCybercrime
Cybercrimepromit
 
Info2 sec 5_-_protecting_ict_systems
Info2 sec 5_-_protecting_ict_systemsInfo2 sec 5_-_protecting_ict_systems
Info2 sec 5_-_protecting_ict_systemssaltashict
 
The house believes that internet acces is a human right
The house believes that internet acces is a human rightThe house believes that internet acces is a human right
The house believes that internet acces is a human rightAgustina
 
Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and CybercrimePravir Karna
 
Information Technology and IT act
Information Technology and IT actInformation Technology and IT act
Information Technology and IT actDivesh Mewara
 
SITA LAB REPORT (XYBER CRIME)
SITA LAB REPORT (XYBER CRIME)SITA LAB REPORT (XYBER CRIME)
SITA LAB REPORT (XYBER CRIME)Asish Verma
 

Semelhante a It legislation (20)

Business And The Law
Business And The LawBusiness And The Law
Business And The Law
 
Computer misuse and criminal law
Computer misuse and criminal lawComputer misuse and criminal law
Computer misuse and criminal law
 
Computer misuse
Computer misuse Computer misuse
Computer misuse
 
Ethics and legislation in the it industry
Ethics and legislation in the it industryEthics and legislation in the it industry
Ethics and legislation in the it industry
 
Computer Miss-use and Criminal Law
Computer Miss-use and Criminal Law Computer Miss-use and Criminal Law
Computer Miss-use and Criminal Law
 
How to stay safe online
How to stay safe onlineHow to stay safe online
How to stay safe online
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptx2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptx
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber Law And Ethics
Cyber Law And EthicsCyber Law And Ethics
Cyber Law And Ethics
 
Cie 2 cyber law
Cie 2  cyber lawCie 2  cyber law
Cie 2 cyber law
 
Info2 sec 5_-_protecting_ict_systems
Info2 sec 5_-_protecting_ict_systemsInfo2 sec 5_-_protecting_ict_systems
Info2 sec 5_-_protecting_ict_systems
 
The house believes that internet acces is a human right
The house believes that internet acces is a human rightThe house believes that internet acces is a human right
The house believes that internet acces is a human right
 
Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and Cybercrime
 
Information Technology and IT act
Information Technology and IT actInformation Technology and IT act
Information Technology and IT act
 
SITA LAB REPORT (XYBER CRIME)
SITA LAB REPORT (XYBER CRIME)SITA LAB REPORT (XYBER CRIME)
SITA LAB REPORT (XYBER CRIME)
 
SHAILENDRA.ppt
SHAILENDRA.pptSHAILENDRA.ppt
SHAILENDRA.ppt
 
ppt cyber law 1.pptx
ppt cyber law 1.pptxppt cyber law 1.pptx
ppt cyber law 1.pptx
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
IT-Presentation.pptx
IT-Presentation.pptxIT-Presentation.pptx
IT-Presentation.pptx
 

Mais de doogstone

Risk assessment
Risk assessmentRisk assessment
Risk assessmentdoogstone
 
Health and safety signage
Health and safety signageHealth and safety signage
Health and safety signagedoogstone
 
Construction electrical safety
Construction electrical safetyConstruction electrical safety
Construction electrical safetydoogstone
 
Presentation constructing a pentagon
Presentation   constructing a pentagonPresentation   constructing a pentagon
Presentation constructing a pentagondoogstone
 
Presentation constructing a heptagon
Presentation   constructing a heptagonPresentation   constructing a heptagon
Presentation constructing a heptagondoogstone
 
Introduction to masonry walling
Introduction to masonry wallingIntroduction to masonry walling
Introduction to masonry wallingdoogstone
 
Surfacefinishes12
Surfacefinishes12Surfacefinishes12
Surfacefinishes12doogstone
 
Snecked rubble step by step
Snecked rubble step by stepSnecked rubble step by step
Snecked rubble step by stepdoogstone
 
Half brick walling calculations
Half brick walling calculationsHalf brick walling calculations
Half brick walling calculationsdoogstone
 
Cutting a cavetto mould
Cutting a cavetto mouldCutting a cavetto mould
Cutting a cavetto moulddoogstone
 
Cutting an ovolo mould
Cutting an ovolo mouldCutting an ovolo mould
Cutting an ovolo moulddoogstone
 
Rock formation
Rock formationRock formation
Rock formationdoogstone
 
Manual handling
Manual handlingManual handling
Manual handlingdoogstone
 
IT guide to data storage and protection
IT guide to data storage and protectionIT guide to data storage and protection
IT guide to data storage and protectiondoogstone
 
IT hardware and software
IT hardware and softwareIT hardware and software
IT hardware and softwaredoogstone
 
Perimeters basic
Perimeters basicPerimeters basic
Perimeters basicdoogstone
 

Mais de doogstone (20)

Risk assessment
Risk assessmentRisk assessment
Risk assessment
 
Health and safety signage
Health and safety signageHealth and safety signage
Health and safety signage
 
Construction electrical safety
Construction electrical safetyConstruction electrical safety
Construction electrical safety
 
Riddor
RiddorRiddor
Riddor
 
Presentation constructing a pentagon
Presentation   constructing a pentagonPresentation   constructing a pentagon
Presentation constructing a pentagon
 
Presentation constructing a heptagon
Presentation   constructing a heptagonPresentation   constructing a heptagon
Presentation constructing a heptagon
 
Introduction to masonry walling
Introduction to masonry wallingIntroduction to masonry walling
Introduction to masonry walling
 
Surfacefinishes12
Surfacefinishes12Surfacefinishes12
Surfacefinishes12
 
Snecked rubble step by step
Snecked rubble step by stepSnecked rubble step by step
Snecked rubble step by step
 
Half brick walling calculations
Half brick walling calculationsHalf brick walling calculations
Half brick walling calculations
 
Cutting a cavetto mould
Cutting a cavetto mouldCutting a cavetto mould
Cutting a cavetto mould
 
Cutting an ovolo mould
Cutting an ovolo mouldCutting an ovolo mould
Cutting an ovolo mould
 
Rock formation
Rock formationRock formation
Rock formation
 
Manual handling
Manual handlingManual handling
Manual handling
 
Chisels
ChiselsChisels
Chisels
 
IT guide to data storage and protection
IT guide to data storage and protectionIT guide to data storage and protection
IT guide to data storage and protection
 
IT hardware and software
IT hardware and softwareIT hardware and software
IT hardware and software
 
Percentages
PercentagesPercentages
Percentages
 
Ratios
RatiosRatios
Ratios
 
Perimeters basic
Perimeters basicPerimeters basic
Perimeters basic
 

Último

This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docxPoojaSen20
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIShubhangi Sonawane
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701bronxfugly43
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxNikitaBankoti2
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 

Último (20)

This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptx
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 

It legislation

  • 1. Information Communication Technology An Introduction to Legislation in the UK Stonemasonry Department 2012
  • 2. Legislation Now that you understand what ICT can be used for, and how you interact with it through hardware devices and software applications it is important to know about the legislation which covers the use of ICT in the United Kingdom. In this presentation you will learn about: The Computer Misuse Act 1990 The Data Protection Act Copyright Law
  • 3. Computer Misuse Act 1990 This act makes it illegal to do any of the following: Access computer material without permission, eg looking at someone else's files. Access computer material without permission with intent to commit further criminal offences, eg hacking into the bank's computer and wanting to increase the amount in your account. Alter computer data without permission, eg writing a virus to destroy someone else's data, or actually changing the money in an account. Information taken directly from http://www.bbc.co.uk/schools/gcsebitesize/ict/legal/1dataandcomputermisuserev2.shtml
  • 4. Is Hacking Illegal? The short answer to this question is NO! Hacking is not illegal provided you are doing it for legitimate purposes. Computer hackers are split into three distinct groups; black hat, grey hat and white hat. ILLEGAL ILLEGAL LEGAL (but not criminal)
  • 5. Is Hacking Illegal? Black hat hackers target the websites/data of organisations or people without permission and with the intent of causing harm, stealing files or profiting as a direct result of gaining access to a system. Grey hat hackers also gain access to systems without the permission of the owner but once in, they either inform the owner of how to improve security or fix any flaws themselves. White hat hackers gain access to systems with the permission of the owner. They carry out penetration testing “pen tests” to make sure that systems are secure.
  • 6. The Data Protection Act (1998) The DPA 1998 was passed by Parliament to control the way information is handled and to give legal rights to people who have information stored about them. Some data and information stored on a computer is personal and needs to be kept confidential. People want to keep their pay, bank details, and medical records private and away from the view of just anybody. If someone who is not entitled to see these details can obtain access without permission it is unauthorised access. The Data Protection Act sets up rules to prevent this happening. Information taken directly from http://www.bbc.co.uk/schools/gcsebitesize/ict/legal/1dataandcomputermisuserev2.shtml
  • 7. Copyright Law This provides protection to the owners of the copyright and covers the copying of written, musical, or film works using computers. FAST is the industry body which is against software theft. There have been cases where laws such as Copyright have been used to crack down on file sharing websites or individuals who store and illegally distribute copyrighted material, eg music. There is a massive problem with many people around the world obtaining copyrighted material illegally. Information taken directly from http://www.bbc.co.uk/schools/gcsebitesize/ict/legal/1dataandcomputermisuserev2.shtml
  • 8. Developed by The Stonemasonry Department City of Glasgow College 2012